Copyright © 2005 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Connecting Patients with the Right Physician
Presentation Prepared For:. Secure user Login provides access to specific ship-to addresses, customer catalog, order processing rules, and other account-based.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © 2008 Pearson Prentice Hall. All rights reserved Copyright © 2008 Prentice-Hall. All rights reserved. Committed to Shaping the Next.
Copyright 2002: LIIF Technology Architecture Review Database Application Architecture Database Application Architecture Collaborative Workgroup Architecture.
Advantage Data Dictionary. agenda Creating and Managing Data Dictionaries –Tables, Indexes, Fields, and Triggers –Defining Referential Integrity –Defining.
The FI-WARE Project – Base Platform for Future Service Infrastructures OCTOBER 2011 Presentation at proposers day.
Virtual Collaboration with SharePoint Instructor: Michael Curry.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
SM3121 Software Technology Mark Green School of Creative Media.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The Dr ü G Book: An Intro to Drupal The Dr ü G Book: An Intro to Drupal (Dr ü G: Drupal User ’ s Group - users, not developers) This is an introduction.
Welcome to the Minnesota SharePoint User Group. Quick Intro Announcements Personalization in SharePoint Configuring User Profiles Configuring Audiences.
Front Page …..is an Asset Management tool designed to record and aid the analysis of activities affecting Production capability and costs. …..promotes.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Marketing done by social interactions – Likes – Shares – Comments FREE! (suppose to be)
ViciDocs for BPO Companies Creating Info repositories from documents.
Captcha Soft solutions Pvt Ltd is a recognized name in the web design industry. For the past three years, we’ve been doing what we love: inventing, conceptualizing,
Point of Sale Collection, cleanup and data analysis.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Risk management in Software Engineering T erm Paper By By Praveenkumar Sammita Praveenkumar Sammita CSC532 CSC532.
EPA Web Procedures and Standards October 26, 2010.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Amber Annett David Bell October 13 th, What will happen What is this business about personal web pages? Designated location of your own web page.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Ideas to Improve SharePoint Usage 4. What are these 4 Ideas? 1. 7 Steps to check SharePoint Health 2. Avoid common Deployment Mistakes 3. Analyze SharePoint.
Microsoft ® Office Outlook ® 2003 Training See and share multiple calendars CGI presents:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
What is Web Site Administration Tool ? WAT Allow you to Configure Web Site With Simple Interface –Manage Users –Manage Roles –Manage Access Rules.
Enterprise Security API (ESAPI) 2.0 Crypto Changes
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Evaluating Network Monitoring Solutions Nathan Freeman
Advertising 1 *The red circles show the position of the keyframes on the timeline. What are banner and pop-up advertisements? 1 Answer Banner and pop-up.
Bonus Features – Free! Jillian & Raul. Session Starters Please silence your cell phones When asking questions please clearly state your name and where.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
1 MSTE Visual SourceSafe For more information, see:
03 | Manage Team Foundation Server Steven Borg | Co-founder & Strategist, Northwest Cadence Anthony Borton | ALM Consultant, Enhance ALM.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Computer Security By Duncan Hall.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
MUG Marketing User Group Agenda Planning with SAM Earlier What graphics works best with what mediums (list serv, web, print, tvs etc) Swiping.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Tool Support for Testing Classify different types of test tools according to their purpose Explain the benefits of using test tools.
Free But Effective Listing Building and Marketing Service How to easily and quickly grow a list of potential buyers and constantly send them marketing.
Software sales at U Waterloo Successfully moved software sales online Handle purchases from university accounts Integrated with our Active Directory and.
The Top 10 Reasons Why Federated Can’t Succeed
What Is Sharepoint? Mohsen Ashkboos
SharePoint Foundation 2010
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec DC October In the Line of Fire: Defending Highly Visible Targets Jeremy Poteet, CISSP Chief Security Officer, appDefense

OWASP AppSec DC Introduction  What is a highly visible application?  Begin at the beginning  Stories from the trenches  Hope - it can be done  OWASP

OWASP AppSec DC You might be a highly visible site if …  … the press shows up for the deployment of your app  … any error message shows up in hundreds of blogs  … you can’t count the number of sites whose sole purpose is to list attack plans and provide tools for breaking into your application  … every hacker, security want-to-be and activist would love to use your site to make a statement  … CNN displays when your site is sluggish on their tickertape

OWASP AppSec DC What makes a highly visible site  Crown Jewels  Money  Data  Notoriety  What it Represents  Making a Statement  Users + Focus

OWASP AppSec DC Signature of a highly visible site  Complex Systems  Multiples  Technologies  Developers  Servers  Applications  Highly volatile  Something to lose

OWASP AppSec DC Highly visible is the same  Still web applications  Same issues still apply  In ideal world, it doesn’t matter  Applications don’t always start as highly visible  Best practices still apply

OWASP AppSec DC Highly visible is different  Time to Impact  Coordination  Number of Cooks  External Visibility  Cascading

OWASP AppSec DC Begin at the Beginning  Learn from the past  Only as strong as the foundation  Know what is expected  Information is your best friend  Prepare for failure

OWASP AppSec DC Dealing With Application Complexity  Team based system  Geographic systems  Custom PDF Generation  File Upload and Downloads  Memory Leak, Scalability or DOS?  Powerful apps = High promotion  Quick resolution to issues

OWASP AppSec DC The Debates  Highest volume  Visibility  Outward - Press  Outward - Voters  Inward - Staff  Large volume of data  Real time responses  Debate timeline changes

OWASP AppSec DC Walling off failure  Isolating Systems From Impacting Each Other  Database Segregation  Application Separation  Access Toggling  Additional Monitoring  Scalability

OWASP AppSec DC Volume of Attacks  High Volume usage goes with High Volume attacks  Cover  Visibility  Assist in attacks  Convention/Debate/Elections  Maximum Impact

OWASP AppSec DC Caching  Minimize data access and processing  Bleed over  Client vs. Server  Shifting of responsibility  Level of Control

OWASP AppSec DC Complete Architecture Shift  Rapid Switch  Rules Reset  Configure Rather than Recode  Assume Nothing  Contingency Plan

OWASP AppSec DC Perception  Worst Case Scenario  Rising Visibility  Increased and Focused Attacks  Gut Check  Perception is Everything

OWASP AppSec DC No site is an island  Branding  Integrated Tools  Integrated Sites  Feeds  Applications are wide ranging  Perception and reality must meet

OWASP AppSec DC Beneath the noise  Constant Attacks  High Volume Pages  Concentrated Volume  Sub-Pages - Understanding how the application functions  Coordinated Attacks

OWASP AppSec DC Out of Your Control  s from application systematically spammed  Data is the system  Pandora’s Box  Containment  Damage Control

OWASP AppSec DC Data Mines  Elaborate system of mines  Access  Mechanism Used  Timestamp  Monitoring  Tracking  Allows the weak link to be located quickly

OWASP AppSec DC Hope - It Can Be Done  No Silver Bullet  Requires  Creativity  Commitment  Diligence  Begin With the Basics  Information is Key

OWASP AppSec DC OWASP  Guide  Top 10  Specific Tools  Put Back In  Take the Advantage

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec DC October In the Line of Fire: Defending Highly Visible Targets Jeremy Poteet, CISSP Chief Security Officer, appDefense